Who Will Retweet This? Detecting Strangers from Twitter to Retweet Information

There has been much effort on studying how social media sites, such as Twitter, help propagate information in different situations, including spreading alerts and SOS messages in an emergency. However, existing work has not addressed how to actively identify and engage the right strangers at the right time on social media to help effectively propagate intended information within a desired time frame. To address this problem, we have developed three models: (1) a feature-based model that leverages people's exhibited social behavior, including the content of their tweets and social interactions, to characterize their willingness and readiness to propagate information on Twitter via the act of retweeting; (2) a wait-time model based on a user's previous retweeting wait times to predict his or her next retweeting time when asked; and (3) a subset selection model that automatically selects a subset of people from a set of available people using probabilities predicted by the feature-based model and maximizes retweeting rate. Based on these three models, we build a recommender system that predicts the likelihood of a stranger to retweet information when asked, within a specific time window, and recommends the top-N qualified strangers to engage with. Our experiments, including live studies in the real world, demonstrate the effectiveness of our work.

[1]  Jianyong Wang,et al.  Retweet or not?: personalized tweet re-ranking , 2013, WSDM.

[2]  Daniel M. Romero,et al.  Influence and passivity in social media , 2010, ECML/PKDD.

[3]  Krishna P. Gummadi,et al.  Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.

[4]  P. Costa,et al.  Revised NEO Personality Inventory (NEO-PI-R) and NEO-Five-Factor Inventory (NEO-FFI) , 1992 .

[5]  Yiming Yang,et al.  A Comparative Study on Feature Selection in Text Categorization , 1997, ICML.

[6]  Danah Boyd,et al.  Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[7]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[8]  Загоровская Ольга Владимировна,et al.  Исследование влияния пола и психологических характеристик автора на количественные параметры его текста с использованием программы Linguistic Inquiry and Word Count , 2015 .

[9]  Duncan J. Watts,et al.  Everyone's an influencer: quantifying influence on twitter , 2011, WSDM '11.

[10]  Jeffrey Nichols,et al.  CrowdE: Filtering Tweets for Direct Customer Engagements , 2013, ICWSM.

[11]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[12]  Rajeev Rastogi,et al.  Recommendations to boost content spread in social networks , 2012, WWW.

[13]  Hai Yang,et al.  ACM Transactions on Intelligent Systems and Technology - Special Section on Urban Computing , 2014 .

[14]  Philip S. Yu,et al.  Identifying the influential bloggers in a community , 2008, WSDM '08.

[15]  Xiaolong Jin,et al.  Exploring social influence via posterior effect of word-of-mouth recommendations , 2012, WSDM '12.

[16]  Jeffrey Nichols,et al.  Recommending targeted strangers from whom to solicit information on social media , 2013, IUI '13.

[17]  Zhi-Hua Zhou,et al.  The Influence of Class Imbalance on Cost-Sensitive Learning: An Empirical Study , 2006, Sixth International Conference on Data Mining (ICDM'06).

[18]  Jeffrey Nichols,et al.  Who will retweet this?: Automatically Identifying and Engaging Strangers on Twitter to Spread Information , 2014, IUI.

[19]  Kristina Lerman,et al.  The Simple Rules of Social Contagion , 2013, Scientific Reports.

[20]  Lada A. Adamic,et al.  The role of social networks in information diffusion , 2012, WWW.

[21]  Nitesh V. Chawla,et al.  SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..

[22]  Divyakant Agrawal,et al.  Limiting the spread of misinformation in social networks , 2011, WWW.

[23]  Leysia Palen,et al.  Pass it on?: Retweeting in mass emergency , 2010, ISCRAM.

[24]  Jon Oberlander,et al.  What Are They Blogging About? Personality, Topic and Motivation in Blogs , 2009, ICWSM.

[25]  Ee-Peng Lim,et al.  Virality and Susceptibility in Information Diffusions , 2012, ICWSM.

[26]  Kyumin Lee,et al.  Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.

[27]  Aram Galstyan,et al.  Information transfer in social media , 2011, WWW.

[28]  D. Funder,et al.  Personality as manifest in word use: correlations with self-report, acquaintance report, and behavior. , 2008, Journal of personality and social psychology.

[29]  Kyumin Lee,et al.  Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.

[30]  P. Costa,et al.  NEO inventories for the NEO Personality Inventory-3 (NEO-PI-3), NEO Five-Factor Inventory-3 (NEO-FFI-3), NEO Personality Inventory-Revised (NEO PI-R) : professional manual , 2010 .

[31]  Qi He,et al.  TwitterRank: finding topic-sensitive influential twitterers , 2010, WSDM '10.

[32]  Tal Yarkoni Personality in 100,000 Words: A large-scale analysis of personality and word use among bloggers. , 2010, Journal of research in personality.

[33]  Yaron Singer,et al.  How to win friends and influence people, truthfully: influence maximization mechanisms for social networks , 2012, WSDM '12.

[34]  Laks V. S. Lakshmanan,et al.  Learning influence probabilities in social networks , 2010, WSDM '10.

[35]  Jeffrey Nichols,et al.  Asking questions of targeted strangers on social networks , 2012, CSCW '12.

[36]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[37]  Yong Yu,et al.  Collaborative personalized tweet recommendation , 2012, SIGIR '12.

[38]  Matthew Michelson,et al.  Tweet Disambiguate Entities Retrieve Folksonomy SubTree Step 1 : Discover Categories Generate Topic Profile from SubTrees Step 2 : Discover Profile Topic Profile : “ English Football ” “ World Cup ” , 2011 .